Improved Signcryption Algorithm for Information Security in Networks

نویسنده

  • R. Bhagavath Nishanth
چکیده

In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique. Index Terms – Cryptographic, Signcryption, KEM, DEM, KDF.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks

In 2012, Alagheband and Aref presented a dynamic and secure key management model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building block in their key management model. They proved the algorithm is as strong as the elliptical curve discrete logarithm problem. In this work, we study the security of their signcryption algorithm. It is...

متن کامل

Dynamic and secure key management model for hierarchical heterogeneous sensor networks

With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the cruci...

متن کامل

Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model

Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...

متن کامل

Signcryption Approaches for Network Security

Signcryption is a new public key cryptography approach to combine digital signature and encryption functionalities as a consequence of the growing consumer demand for information security. The necessity to achieve confidentiality, integrity, authenticity and non-repudiation properties in data communication that motivates new demands for signcryption schemes. The framework of signcryption involv...

متن کامل

Security Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme

At present, Body Area Networks (BANs) are budding as one of the major research interests, predominantly in the field of personal health monitoring. In view of the fact that health data are extremely private and includes sensitive details, the security of data transmission inside a BAN turns out to be a critical issue that needs instant attention. In this study, Attribute-based Ring Signcryption...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015